www.howtonetwork.org

CCNA & CCNP Certifcation Training

  • About
  • Contact
  • FAQ
  • Join
  • Home
  • CCNA
    • ICND1
    • ICND2
    • 101 CCNA LABS
  • CCNP
    • ROUTE
    • SWITCH
    • TSHOOT
    • 101 CCNP LABS
  • CompTIA
    • Security+
    • Network+
  • Design
    • CCDA
    • CCDP
You are here: Home / CompTIA / Security+ / Chapter 3: Threats and Vulnerabilities

Chapter 3: Threats and Vulnerabilities

In this chapter, we will discuss threats and vulnerabilities facing computer users and systems today, and differentiate among them so you will be well equipped to both prevent them and remediate them when they occur. This chapter will cover types of malware and attacks, including viruses, spyware, Trojans, rootkits, DDoS attacks, smurf attacks, phishing, and vishing. It will also detail special types of attacks, such as those made using social engineering, over wireless networks, and utilizing application exploits. Finally, we will look at mitigation and deterrent techniques, as well as the tools available to test and find threats and vulnerabilities . . .

The content below this message is for members only.

About Us

This is a free bonus site for members of www.howtonetwork.com

Copyright

The content on this copyright Reality Press Ltd.
Copyright Reality Press Ltd.